Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security.
It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows
🔧 Lab Setup Includes:
•🐉 Kali Linux – Recon & exploitation
•🐧 Ubuntu (Wazuh) – SIEM for monitoring & correlation
•🛡 pfSense – Firewall + segmentation
•🧪 Suricata IDS/IPS – Threat detection & active blocking
•🪟 Windows Server AD – Domain & user management
•🎯 Metasploitable – Vulnerable target for testing
🎯 Key Achievements:
•🚨 Detected Nmap stealth scans with custom Suricata rules
•🚫 Blocked malicious traffic using IPS mode
•🔐 Identified brute-force attempts via Wazuh alerts
•🕵️♂️ Flagged Mimikatz credential dumping (MITRE T1003.001)
•🔄 Correlated pfSense → Suricata → Wazuh logs for validation
•🛡 Set up FIM, vulnerability scans, and log-based detections
•📊 Built a practical layered defense similar to real SOC environments
🔗 Open to connecting with SOC analysts, cybersecurity pros, and recruiters let’s collaborate and grow together
🤖 Unlock the Power of ChatGPT with These Essential Prompts
In this carousel you’ll find a curated set of practical high-impact prompts to help you get more out of ChatGPT whether you’re writing coding brainstorming learning or automating tasks
(Comments PDF for the full guide)
💡 Each prompt is crafted to help you:
•Boost productivity and efficiency
•Spark creative ideas and solutions
•Streamline repetitive work
•Support learning and professional development
Get a solid grasp of binary math, subnetting logic, and IP design fundamentals. Whether you’re an experienced engineer or just beginning your networking journey, this guide simplifies everything you need to know to level up your subnetting skills.
Cybersecurity isn’t just about certifications it’s about real-world skills. I’ve curated 100+ projects that let you tackle Red & Blue Team scenarios, incident response, and threat analysis just like in a real SOC.
What You’ll Gain:
🔹 Practical Red & Blue Team experience
🔹 Real-world detection, analysis & response skills
🔹 Hands-on use of popular cybersecurity tools
🔹 Portfolio-ready projects for job interviews
📘 Sharing a Powerful Resource on Windows Deployment Services (WDS)
I’m excited to share a highly valuable document that takes an in-depth look at Windows Deployment Services (WDS).
✉️Comment PDF for full Guide
Written by a member of the Microsoft Deployment Toolkit (MDT) team this guide is part of Microsoft’s Official Curriculum making it one of the most trusted resources you can learn from.
Inside, the handbook breaks down key areas such as:
🔹 WDS architecture and the full deployment workflow
🔹 PXE boot setup and configuration
🔹 Creating, capturing, and managing Windows images
🔹 Streamlined automated rollback processes
🔹 Best practices for building
DNS (Domain Name System) is basically the 📖 phone book of the internet.
It translates human-friendly domain names (like ) into machine readable IP addresses (like 142.250.190.78) so computers can find each other across the network. google.com
🧠 Why Do We Need DNS?
Humans remember names easily not numbers
Instead of typing an IP address every time, you just enter a domain name, and DNS automatically finds the right IP for you. ✨
⚙️ How DNS Works (Step-by-Step)
1️⃣ You type a website name →
2️⃣ 💾 Local Cache Check: Your computer first checks its local DNS cache (recently visited sites)
3️⃣ 🌍 DNS Resolver: If not found it asks a DNS resolver (like your ISP or Google’s DNS — 8.8.8.8)example.com